Configuring Authentication Through Network Access Servers; Figure 29: Port Limit Control Configuration - LevelOne GEL-2670 User Manual

24 ge + 2 ge sfp l2 managed switch
Table of Contents

Advertisement

| Configuring the Switch
C
4
HAPTER
Configuring Security
C
ONFIGURING
A
UTHENTICATION
T
N
HROUGH
ETWORK
A
S
CCESS
ERVERS

Figure 29: Port Limit Control Configuration

Network switches can provide open and easy access to network resources
by simply attaching a client PC. Although this automatic configuration and
access is a desirable feature, it also allows unauthorized personnel to easily
intrude and possibly gain access to sensitive network data.
Use the Network Access Server Configuration page to configure IEEE
802.1X port-based and MAC-based authentication settings. The 802.1X
standard defines a port-based access control procedure that prevents
unauthorized access to a network by requiring users to first submit
credentials for authentication. Access to all switch ports in a network can
be centrally controlled from a server, which means that authorized users
can use the same credentials for authentication from any point within the
network.
– 90 –

Advertisement

Table of Contents
loading

Table of Contents